Optimizzin wrote:
The only use for instant kill weapon in warfare would be for an
officer to shoot mutineers.
Or vice-versa.
I was advised to use a fragmentation grenade to off an officer,
slid under the tent flap, or lobbed from the dark. An officer
can kill a mutineer with impunity, whether
The Dartmouth site is related to a broader federal PKI Technical
Working Group which is developing PKI standards and protocols.
See:
http://csrc.nist.gov/pki/twg/welcome.html
Below are two recent messages from the PKI-TWG mail list
on some of the work being done.
Subscribe to the PKI-TWG
Frederick Kagan, a historian at the US Military Academy,
argued in a talk recently that the US needs to:
More than double its defense expenditures;
Ignore the Europeans and other allies due to their military
ineffectuality and insufficient defense budgets;
Prepare for long-term US military
Frederick Kagan spoke at the Princeton Club, New York City,
Tuesday evening, April 9, 2002.
http://www.princetonclub.com
American Heritage Lecture Series -- Special Guest
Frederick W. Kagan
After September 11: Terrorism and the Enduring Bases of
American Defense Strategy
Details:
Join us
What is peculiar about the rejoinders to Lucky's sensible proposal
is the dismissal of it with elaborate affirmations of mathematical
surety, as if there has not been voluminous warnings to never
rely on mathematical surety when weaknesses are far more
likely to be found in the faulty
http://www.techtv.com/cybercrime/features/story/0,23008,3381901,00.html
A Most Deadly Game
CyberCrime' investigates a website that calls for contract killings of
public officials. Is it an exercise in free speech or a manifesto for
murder? Find out more,
Lucky is to be commended for igniting a neglected aspect
of the crypto wars: what happens to cryptosystems over
time after they have been invented, tested, criticized, vetted
and conditionally trusted, then gradually widely distributed
as the best available under practical usage, then
Analysis of Neural Cryptography
Alexander Klimov, Anton Mityaguine, and Adi Shamir
Computer Science Department
The Weizmann Institute, Rehovot 76100, Israel
{ask,mityagin,shamir}@wisdom.weizmann.ac.il
Abstract. In this paper we analyse the security of a new key exchange
protocol proposed in
Thomas Friedman in the New York Times today:
http://www.nytimes.com/2002/05/26/opinion/26FRIE.html
Webbed, Wired and Worried, May 26, 2002
I've been wondering how the entrepreneurs of Silicon Valley
were looking at the 9/11 tragedy; whether it was giving them
any pause about the wired world
Officials, and journalists, accustomed to handling civil unrest
through police means, have to stretch to get their hands on
national security threats, in particular what to do with military
capabilities which are scaled for much greater threats than
the police can handle.
The military doesn't
This hit to Cryptome today must be the rapid response to Ashcroft's
openly sicking the FBI on the net:
http://home.leo.gov/rollcall/internet_tips/2002/tip_060302.htm
Leo.gov is an FBI domain, though its use is not limited to that
agency.
Our posting aerial views of nuclear submarine bases
A follow up on the LEO hit of Cryptome on 4 June 2002 referred
from
http://home.leo.gov/rollcall/internet_tips/2002/tip_060302.htm
Here's the LEO website:
http://www.fbi.gov/hq/cjisd/leo.htm
Activities described on this site appear to contradict recent
congressional testimony by the FBI
Data retention is being done now by programs and services
which cache data to ease loading on servers and networks.
No approval needed from anybody, indeed, the service is
being offered as a cost saver and expeditor of net services
to ISPs and anybody else who might be eager to get around
I appreciate what an honorable ISP admin will do to abide customer
rights over intrusive snoopers and perhaps cooperative administrators
above the pay grade of a sysadmin. Know that a decent sysadmin is on
for about 1/3 of a weekday for 24x7 systems is a small comfort but
leaves unanswered what
Ross has shifted his TCPA paper to:
http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf
At 07:03 PM 6/22/2002 -0700, Lucky wrote:
I recently had a chance to read Ross Anderson's paper on the activities
of the TCPA at http://www.cl.cam.ac.uk/ftp/users/rja14/.temp/toulouse.pdf
Bob Open Mike Hettinga kariokaed:
I try not to post news to cypherpunks. :-). I post *lots* of news to the
dbs list, of course...
To prevent spamming DCSB is subscriber only, as are all my own lists.
Rolling in the phsst-shot EVA, shitting my spacesuit, wailing for yo
momma's impaired irony:
Ross said MSNBC had pulled the Palladium story, not Newsweek.
Other Levy stories remain available on MSNBC. A search on
MSNBC for Palladium produces Steven Levy's chat about
Palladium:
http://www.msnbc.com/m/nw/talk/archive.asp?lt=062502_levy
Still, it may policy for MSNBC to pull Newsweek
John Gilmore initiated a federal suit today in CA Northern District
against Ashcroft, et al, challenging the air travel ID requirement:
http://cryptome.org/freetotravel.htm
From the United States Department of Defense
No. 136-P
PRESS ADVISORY July 24, 2002
The DoD Chief Information Officer John Stenbit will conduct
a demonstration of the DoD's use of its public key infrastructure
(PKI) to mark issuance of the millionth PKI certificate set,
Friday, July 26, at
Bear in mind that Declan has always favored the copyright industry,
after all that fits his ambition to be a star in that field, not that he
is alone in seeking media celebrity by seducing others with the
allure of attention and fame. He drops way too many names
not to come across as an
In the September Atlantic Monthly Bruce Schneier explains
yet again why cryptography is not the solution to security;
what's needed are private cyber cops like his:
http://www.theatlantic.com/issues/2002/09/mann.htm
Amazing how Bruce's philosopy matches that of those
he once combated in the
Cryptome offers 2 court orders and 22 formerly sealed documents
in the case of Abdallah Higazy, an Egyptian national in the US to
attend school, who was detained as a material witness based
on a false accusation by a hotel guard of possessing an air-to-ground
communcation device while staying
http://cryptome.org/intel-anon.htm
[Excerpt. There are 15 images in the patent.]
Anonymity Server, May 14, 2002
Description
BACKGROUND
1. Field
The present invention relates to the field of communications.
More particularly, the present invention relates to a system and
method for
We were at the DC march. It took two hours to pass a point, and we left
before the end had appeared, in fact couldn't see the end. The Wash Post
reported
over 100,000 participated, largest since Vietnam.
We videoed and photoed the demo, but tape and chip were confiscated Sunday
by the guards at
Schemes for vengeance that promise safety for the avenger won't cut it, for
those are the coward's way and can be countered by upping the promise to
hurt the coward, which knocks out the will to act beyond bravado.
It's true that most of the world's leaders, and petty aspirants to power,
exhort
Based on Larry Augustin's apology for cops and his avowed closeness to them, a protest
is even more deserved against him if not the other participants.
Larry appears to be quoting from the COPS PR manual for garnering public support to
offset deserved criticism of official misbehavior.
Larry
It's common for those accomplished in one field to believe that ability is confidently
transferrable to another, in particular for social, political and religious matters --
and vice versa.
Endeavors which require close, sustained concentration and logical methodologies
seldom help with
I'm currently working with Rafael Vinoly's firm, though not on the WTC project,
instead a giant medical research campus outside DC for the Howard Hughes Medical
Institute, a cool $500 million semi-underground facility described at hhmi.org.
Vinoly's on a roll, just having won a competition for
What intrigues about Tim's message was the implication that the war on terrorism, by
all sides, is fundamentally about racism, although camouflaged by political and
economic drapery. As was, and is, imperialism and its bastard clone, capitalism.
Demonizing the enemy, whether by skin color, by
Response and addition to:
http://cryptome.org/war-reason.htm
From: V
To: [EMAIL PROTECTED]
Date: Sat, 15 Feb 2003 14:01:47 -0500
Subject: Racism is Not Fashionable
Tim May writes..
A war that, Allah willing, causes Washington, D.C. to be be hit with a
suitcase nuke, cleansing it of a
Excerpts from a NY times book review today of an American
history of weapons of yokel seduction:
http://www.nytimes.com/2003/02/16/books/review/16BROOKHT.html
'To Begin the World Anew': The Founding Yokels
By RICHARD BROOKHISER
Of the storms of fashion that have pounded the humanities during
America's founding crackers set up a slave-owning nation, after 300 years of murdering
natives, following the still alive and well European/Asiatic/African tradition of
stealing from others while being doped by witchdoctors and astrologists (today's
intelligence industry).
Politics and
What's nice about predictions is that they are less than worthless, so nobody gives a
shit about them except their makers.
More Americans will die in the homeland than in and around Iraq. Most of the military
who will die in and around Iraq will be no where near combat, just dying there the way
There's much more to the case than has been published, some 28MB of it.
Ready to go depending on how the secret hearing turns out. Citibank is being
lured into a trap of its own making, along with Cambridge daredevils.
Reminds of MPAA, RIAA and TIA, and the mongerers have more dirty tricks
up
Which defacement? Cryptome offers nothing else. Caveat emptor.
Beware stings, spoofing, double spoofing, and the honest to god truth
about logs and mail and ... disinfo agents provocateur.
Here are a couple of messages from the spoofed or spoofing
hacker(s):
Thomas Shaddack wrote:
Last time I checked, cryptography (and technologies in general) empowers
the Individual against the Bigger Entities - regardless if they are
Megacorps or Governments[1]. Hence, anticorporate views have their natural
place on this list.
[1] As the entanglement between
We did a drive-by this afternoon of the National Reconnaissance Office HQ
in Chantilly, VA, to see what corporations who operate its technology were
in the neighborhood. Across the street was Lockheed Martin, Boeing,
and a gaggle of same-faced untitled buildings. Down Conference Dr was
the FBI's
Stuart wrote:
What's to link? All that can be linked is that a metrocard was bought
in one place, be it a subway station, deli or whatever, and then used
somewhere else, the subway or bus. Hundreds of metrocards are bought
at every station every day, used once, and tossed in the trash.
All that
Here's a diagram and after-use photos of the carbon filament
bomb, as used in the 1999 FYU live weapons test:
http://cryptome.org/blu114-yu.htm
The e-bomb has been extensively covered since Australian Carlo
Kopp published his description (invention?) of it:
http://cryptome.org/ebomb.htm
Why not load a POW or dead body with biologicals and return
them to the UN for handing over to the US for return to a heroe's
welcome, or to a hospital in Germany, emitting toxics to every
caretaker, then on to a recruitment parade down Broadway and
photo op at the Whitge House and the Pentagon
Ben,
Would you care to comment for publication on web logging
described in these two files:
http://cryptome.org/no-logs.htm
http://cryptome.org/usage-logs.htm
Cryptome invites comments from others who know the capabilities
of servers to log or not, and other means for protecting user
The alarm and security specialists we've talked to claim the
greatest threat to systems are authorized users: the property
owners, their children, employees, servants, nearly all of whom
fail to arm and disarm the system properly not matter how
carefully instructed.
A false alarm is feared by
The New York Times reports on this case today:
http://www.nytimes.com/2003/08/12/business/12TAX.html
Sherman Austin was arrested in New York but not charged and held in
prison there to await an indictment in California. New York said it
had no legitimate charges to make against him and merely did
a favor for California to nab Sherman during a street demonstration --
the only arrest of the day.
Quiet here in New York City, thousands walking in the streets, auto
traffic is pleasantly minimal along upper Broadway. Traffic lights inoperative, as
well as computers except for laptops such as this.
Telephones working. Portable radio says the outage is due to
northeast electrical grid
Are you suggesting the outage was caused by carbon filaments rocketed
across transmission lines? If that was done at several points in the grid it
would account for the various finger-pointing to incidents which are claimed
to have started the usual-suspect cascade of the usual-suspect antiquated
Jessica Stern's new book, Terror in the Name of God : Why
Religious Militants Kill, has about 8 pages on Jim Bell, in
a chapter called Lone Wolf Avengers, which is shared with
the Pakistani Kansai, assassin of CIA employees.
Stern says that while Bell is not a religion-based terrorist
he is
Nonshit, Robert, Ray's an organ-eating anarchist not a
vapid tea-sip socialist. A while back Ray yanked a
capitalist apologist's lawyer's cold dead dried nut heart
from behind a Kevlar diamond-studded vest and lipped
and tongued it like a lady's freeze-dried private then
swallowed it whole,
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted
Communications, by Elad Barkan, Eli Biham, Nathan Keller
http://cryptome.org/gsm-crack-bbk.pdf (18 Pages, 234KB)
Abstract. In this paper we present a very practical cipher-text only
cryptanalysis of GSM encrypted communications, and
Don't ever respond to a jury summons by showing up or calling
in. If you do then you'll forever be in the sucker-responsive data
base.
The warnings in summons are shinola shit, effective only on those
who are indoctrinated to fear official warnings printed on paper.
If you get a summons in the
Yes, GPS tracking was allegedly done to Jim, and its illegality
is one of the points of his appeal. He claims that the legal basis
for installing the device and data-spotting his movements were
flawed. And that there were problems as well with interpretation
of the data. Jim tried to argue
James Donald wrote:
And this, of course, assumes that Professor Rat is real, rather
than an american agent provocateur sshing to Australia. For an
Australian, he seems oddly obsessed with US figures.
Based on when Rat began to post, and the gush of charges
allegedly made against him elsewhere
James overlooks the agricultural virtue of cypherpunks death
and rebirth for the natural cycle gets rid of old growth and allows
for a new improved version.
No doubt the old crop doesn't get much satisfaction being
taken for manure, nor do the new sprouts see any reason to hail
the shit
According to the Reuters account below, it was Robertson, not
Mowbray, who called for the State Department nuking.
A Virginia citizen who would be nuked if State is, has reported
Robertson to the FBI TIPS, observing that a Muslim cleric who
made such a comment would surely be arrested or
We received the note below about spyware allegedly created for
a Maryland agency with code which needs to be tested.
We'd appreciate feedback on the note and the code. Beware
of a sting. The code:
http://cryptome.org/ExpCode.ASM
-
The note:
CPR Tools Inc. of Labelle, Florida is engaged
Matt wrote:
Why open the door to them? I have a few friends who as a matter of principle
do not open their doors to people they do not know. Letting a Fedgoon in is
akin to inviting a vampire into your house.
I was expecting someone else at about the same time. True, I could
have refused entry
Declan wrote:
Even if you don't have a lawyer on retainer, and I suspect few folks
here do, saying you need to consult with one will provide you with
time to give the local ACLU affiliate a call. Also law school legal
clinics can be useful sources of free advice in a pinch.
I've consulted a
We've made a few FOIA requests, but none have produced a
flood of paper like that made to the US Army INSCOM for a list
of military intelligence files provided by anonymous, most dating
from the 1940s and 1950s but some up to the 70s and 80s.
An aspect of the response has been INSCOM forwarding
My comment about the SAs having no noticeable body odor
came out the notion that persons on a dangerous mission
emit an easily identifiable smell, a smell not unlike that
emitted by an unwary target when suddently confronted with
danger.
Innocents need not worry about these unintentional fear
When I got censored by [EMAIL PROTECTED] a couple
of weeks ago I tried to subscribe to these nodes:
Algebra
Infonex
Lne
Minder
Sunder
Pro-ns
Openpgp
Ccc
Subscription was successful only on:
Algebra
Pro-ns
Both of thse provided a who response on 11/10/03 of
Algebra 122
Pro-ns 14
I get the
4.0
Date: Sun, 07 Dec 2003 19:37:26 -0800
To: [EMAIL PROTECTED]
From: John Young [EMAIL PROTECTED]
Old-Subject: Re: Decline of the Cypherpunks list...Part 19
In-Reply-To: [EMAIL PROTECTED]
References: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id: [EMAIL
Nomen Nescio wrote:
I find it strange that some people here so often wants to
intimidate those that dares to ask some questions.
Eric put it very well in his post about dicksizewar. Very
true indeed.
I find it very *l*a*m*e* to all the time tell people to RTFM
when something comes up that
It was discovered a while back, check the archives, or Tim's
FAQ, that all the remailers were compromised, with or without
the operator's complicity with TLAs. After that discovery there
was a turning of the covert control to re-direct it toward its
implementer(s). That was soon re-turned by the
There's a good possibility that Saddam was traced by Tempest
sensing, airborne or mundane. The technology is far more sensitive
than a decade ago. And with a lot of snooping technology kept obscure
by tales of HUMINT, finks, lost laptops and black bag jobs.
For less sensitive compromising
This came in response to Cryptome's posting of Len Sassman's
comments on remailers.
-
From: S
Subject: Re: remailers-tla.htm Compromised Remailers, December 15, 2003
Date: Mon, 15 Dec 2003 16:16:17 -0700
To: [EMAIL PROTECTED]
Message-Id: [EMAIL PROTECTED]
Thank you for posting the
What's pleasurable about reading the fiction of ideologues like
Tim is the smack-down tone of their prejudices. Fake, fake,
fake.
Nowhere in Tim's spew is the recognition that the largest
beneficiaries of government favoritism are corporations and
wealthy individuals like himself, especially
Tim has become so proprietary about cypherpunks it's strange
that he's never operated a node himself, or underwritten all of
them in the generous spirit of John Gilmore. Maybe Tim has
been underwriting them quietly and that accounts for his
obnoxious bitching when the discourse doesn't go the way
Follow the invisible man's rainbow socks in sandals. The real emitter
not the no-knock-knocks wearing Tempest protection and LEDs
in horn-rims.
Hear their beeps, scatter, there's a nab acoming.
Once I almost met a cpunk, then it vanished, lo, it was
a cyberpunk oozing.
Despite the long-lived argument that public review of crypto assures
its reliability, no national infosec agency -- in any country worldwide --
follows that practice for the most secure systems. NSA's support for
AES notwithstanding, the agency does not disclose its military and
high level
Brian Dunbar wrote:
Like it matters. Do you really think that the government would really
allow Intel and AMD to sell CPUs that didn't have tiny transmitters in
them?
Your CPU is actually transmitting every instruction it executes to the
satellites.
That's a subtle bit of humor, right?
http://www.wisdom.weizmann.ac.il/~tromer/acoustic/
Acoustic Cryptanalysis: On nosy people and noisy machines
Adi Shamir and Eran Tromer
A powerful method for extracting information from supposedly
secure systems is side-channel attacks, i.e., cryptanalytic
techniques that rely on information
Information, speculation or leads on the Iranian cryptosystem
allegedly cracked or black-jobbed by the US are welcomed for
publication on Cryptome.org.
Reported today in the NY Times and elsewhere. The Times
claims it was asked by the USG to withhold information about
the crack (allegedly
Crypto AG's website denies the allegation of its machines being
compromised. Its FAQ claims the false the story got started in
1992 by a disgruntled employee.
There, that reassures Iran, Botswana, Nigeria and Uganda.
NSA never had those meetings with the machine designers.
Now, how about
It appears that the Feds and LEA at the DNC Convention
have ordered Yahoo to axe the mail list TSCM-L run by James
Atkinson for his blistering attack on security at the convention.
http://cryptome.org/dncsec-yahoo.htm
Jim's reports on the inferior security:
http://cryptome.org/dnc-insec.htm
Not yet aware the NY-bound wetback had been nabbed we posted material
and photos on July 29 about how Amtrak and Long Island Railroad Manhattan
tunnels provide easy access to Madison Square Garden located above
subterranean Penn Station and the nearby post office where the thousands
of press
Indeed, this is the way of US founding fathers, as with today's
corporations and citizenry enjoying global predation.
Rebellion against authority using its tools and resources is the
only rebellion that works. And the only one feared by authorities,
knowing at they do from their own practice,
Ken wrote:
Crazy authoritarianism. Rules for the sake of rules. They exist to
show who is boss. Like school uniforms or corporate dress codes -
the rule is made not to enforce any desirable behaviour but to
show who is where in the the hierarchy, who is able to make rules
and who has to obey
Excerpt below from a Baltimore Sun article of August 8, 2004.
Some of it could be true, but.
http://cryptome.org/dirnsa-shift.htm
-
Director of NSA shifts to new path
By Scott Shane
Sun National Staff
August 8, 2004
..
Technology revolution
Given the dire assessments a few years
ABC News is offering a report this evening on how
the Internet may be helping terrorism. For it Cryptome was
grilled and taped yesterday for aiding and abetting. We
confessed it's due to brain-liberating by the manchurian
cypherpunks.
There a text version of the report on abcnews.com and a video
is available to subscribers.
To keep the nation secure the web site is not named. Google
search appears to do it based on hate mail coming in.
The ban on Teddie flying had nothing to do with natsec. Years
ago it was tried due to his being drunk and his stench of piss, vomit
and scotch. Later, it was tried due to his being drunk, stinking, and
too fat to fit in a single seat, demanding two or more, depending
on whether he could be
That was a surprise and I missed it. Saw the re-run just
now. Pretty funny, ISTM.
The clip was from an AP TV piece which was taped
just before the recent AP story. One day a still photographer
and video guy came to do a follow-up to a telephone interview
by Tom Hays, the AP reporter. No fanfare
The FBI visit took place in November 2003. Here's an account:
http://cryptome.org/fbi-cryptome.htm
The John Stewart piece excerpted an AP-TV clip taped on
August 16 which was a supplement to an AP story about FBI
harassment of potential RNC protestors.
AP, like ABC News, confused the
No problem accessing blackbox.org and Parts 1 and 2 of
the file at 5:15 PM EST.
Perhaps there are blocks on some incoming routes.
Remailers remain effective when you run your own as the
first hop and accept no incoming remail.
To be sure, if everyone did that no remailer would accept
remails. Shhh.
Tyler Durden wrote:
And if you ask me, fanaticism never lasts very long
anywhere, only for about a generation during turbulent times.
That is what King George and his redcoats said about the
ragtag colonials, American as well as those who suffered the
king's abuse into the 20th Centruty.
James A. Donald:
I don't recall the American revolutionaries herding children
before them to clear minefields, nor surrounding themselves
with children as human shields.
No, not minefields, but a good percentage of Washington's
army and that of the French, were children. Young boys were
taught
The site has been overloaded for a couple of days due
to heavy hits on files on the Indymedia UK takedown
and the Bush bulge. A Slashdot attack added to that
yesterday but has gone away. Today The Reg cited
the Bush bulge file and the overload restarted. It'll
pass shortly, maybe.
Most of the Boston Red Sox team look as if they have just
come from a terrorist training camp for blind, handless barbers,
decked-out in ill-fitting sports gear, staring wild-eyed at
RPGs being fired at their heads and nuts, swinging clubs futilely
at the inerrant missiles, their ass-wipe paws
James is wired to be unempathetic about victims, as was McVeigh,
as are fearless military and criminal killers, as are national leaders
of a yellow stripe who never taste the bitter end of their exculpatory
spin.
What makes the wire work is that they do not believe that what
they do unto others
James,
I appreciate your valiant if futile effort to defend honorable
militarism, but you appear not to understand that much of
current US military doctrine is aimed at terrorizing enemy
forces, en masse, into submission, not merely courageously
killing each combatant, mano a mano.
Carpet
There were several USG offices in the Twin Towers, some of
them intelligence. In addition, CIA was located in 7 WTC, along
with Secret Service and military offices. The military offices
were used as cover for the others. There was far more USG in
WTC than in Murrah, and the lesson learned in OKC
Generously, the US government offers a complete set of
photos, drawings, process diagrams and descriptions for
an RDX manufacturing plant. Library of Congress has
the info in its Historic American Engineering Record.
http://memory.loc.gov/ammem/collections/habs_haer/
Search on RDX.
Now it
Now, Bob, master your knee jerk eye-poke: Brooks is a
regular on the Lehrer show, paired with Shields for, cough,
balance. Muddle v. muddle, judge-judied by muddle.
Brooks is the only one of the three without orange hair,
the other two a generation older. And he's near wattleless.
His sparse
Brooks on The Lehrer Report last night did indeed go berzerk
in the face of Shield's superior defense of Kerry's reasonable
approach. Brooks repeatedly agreed with Shield's analysis
showing Bush/Cheney was dogmatic, inflexible and incapable
of admitting error, then went on to defend their
Hoover Institution says it all. Heh.
Will to win is the opium of warmongerers, Nietszchean
armchair blowhards.
Come on, Bob, you did the philosophy turn, poke holes
in the blather coming from these righteous pedants hustling
for the military/natsec ghouls, extorting the public for
expensive
To state the obvious to Major Variola, CDC will have first
indication of a devastating US attack, reported fragmentarily
under its links to hospitals, clinics and physicians, against
which the might military and law enforcement have no defenses.
By time the attack is understood it will be too
There is a decreasing chance the US can apply its military
might to defeat an unconventional enemy. That kind of enemy
is not what long-standing military strategy and most tactics
are aimed at. Rumsfeld was hoping to revise that when yet
one more mighty military war appeared to head off changing
And an admirable role model for the Simian's memory:
An avenging rebel terrorist shot Abe, not Grant, who
suicided himself with whiskey and self-pity, after lollygagging
in the animal-beshat White House, lost that, took up liquor,
became a helpless drunk, friends caretook his inept pickled
The US has not won since WW2. Rebellions, now called
terrorist wars, have been far more successful. If you want
to be a winner do not enlist in military forces of states, rather
get a spin contract far from danger, arguing the virtues of
mightily fearsome hardware and sacrificial patriotism.
The
1 - 100 of 125 matches
Mail list logo